WO2010111843A1 - 合法监听的方法、系统及移动交换中心 - Google Patents

合法监听的方法、系统及移动交换中心 Download PDF

Info

Publication number
WO2010111843A1
WO2010111843A1 PCT/CN2009/071166 CN2009071166W WO2010111843A1 WO 2010111843 A1 WO2010111843 A1 WO 2010111843A1 CN 2009071166 W CN2009071166 W CN 2009071166W WO 2010111843 A1 WO2010111843 A1 WO 2010111843A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
bss
msc
local exchange
handover
Prior art date
Application number
PCT/CN2009/071166
Other languages
English (en)
French (fr)
Chinese (zh)
Inventor
柳军
王之曦
朱星
秦钧
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP09842500A priority Critical patent/EP2426967A4/de
Priority to CN200980117319.XA priority patent/CN102405662B/zh
Priority to PCT/CN2009/071166 priority patent/WO2010111843A1/zh
Publication of WO2010111843A1 publication Critical patent/WO2010111843A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/304Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting circuit switched data communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/10Reselecting an access point controller

Definitions

  • the present invention relates to the field of mobile communication technologies, and in particular, to a method, system, and mobile switching center for lawful interception. Background technique
  • the mobile switching center (MSC) in the core network (CN) generally completes the connection of the voice channels of two communication terminals of one session, that is, the call is to be Establish a user plane link and a control plane link from the terminal to the MSC via a Base Station Sub-system (BSS).
  • BSS Base Station Sub-system
  • the above transmission network is an important part of a mobile communication network, especially a Global System for Mobile communication (GSM) network.
  • GSM Global System for Mobile communication
  • the local exchange of the user plane link in the BSS is an effective method for reducing the occupation of the transmission resource.
  • the local exchange performed in the BSS that is, the channel of the two communication terminals is looped back in the BSS.
  • the basic scheme of the local exchange is that the control plane link of the call is still connected to the MSC in the CN for control, and the user plane link of the call is directly looped inside the BSS.
  • Lawful interception refers to the activities of the national security department to monitor telecommunication services within the scope permitted by law. Any monitoring activity should be authorized by the relevant national authorities.
  • all operating mobile communication networks including GSM, Code Division Multiple Access (CDMA) and future Wideband Code Division Multiple Access (GW) Multiple Access (W-CDMA for short), etc., must enable the national security department to monitor the target user equipment and provide a listening interface for monitoring.
  • the monitoring system of the national security department accesses the mobile communication network through the interception interface to implement monitoring of the target user equipment, wherein the target user equipment refers to the communication terminal that is being monitored.
  • the services that can be monitored include: call service, fax service, asynchronous data service, short message service, and supplementary service.
  • the devices that require the interception access function include: Home Location Register (HLR), Mobile Switch Center (MSC), and Short Message Center (SMC).
  • HLR Home Location Register
  • MSC Mobile Switch Center
  • SMC Short Message Center
  • the interception of all calls is provided by the MSC to the listening system.
  • the embodiments of the present invention provide a method, a system, and a mobile switching center for lawful interception, so as to implement lawful interception of voice channels between terminals.
  • the embodiment of the invention provides a method for lawful interception, which includes:
  • the mobile switching center MSC is configured to perform lawful interception of the conversation path.
  • the embodiment of the present invention further provides a mobile switching center MSC for lawful interception, where the MSC is used to establish local exchange of the voice between the first terminal and the second terminal in the base station subsystem BSS or in the BSS. After establishing a local exchange of the voice channel between the first terminal and the second terminal, the BSS is notified to output a bypass to the mobile switching center MSC for performing lawful interception of the session.
  • the embodiment of the present invention further provides a lawful interception system, including: a mobile switching center MSC, a base station subsystem BSS, and a monitoring system, where The MSC is configured to establish a local exchange between the first terminal and the second terminal in the base station subsystem BSS, or establish a local exchange between the first terminal and the second terminal in the BSS, Said BSS output bypass to the mobile switching center MSC;
  • a lawful interception system including: a mobile switching center MSC, a base station subsystem BSS, and a monitoring system, where The MSC is configured to establish a local exchange between the first terminal and the second terminal in the base station subsystem BSS, or establish a local exchange between the first terminal and the second terminal in the BSS, Said BSS output bypass to the mobile switching center MSC;
  • the BSS is configured to perform a bypass operation, and the output is bypassed to the MSC to connect the established session between the terminals to the MSC;
  • the MSC is further configured to extract voice from the bypass connected to the MSC to the listening system; the monitoring system is configured to perform lawful interception of the conversation path by voices elicited from the MSC.
  • the method, system and mobile switching center of the lawful interception of the embodiment of the present invention can realize the bypass from the MSC for the monitoring system by continuing the call between the two terminals to the MSC from the BSS.
  • the method does not cause a voice interruption on the voice between the two terminals that have established the local exchange or can shorten the time of the voice interruption, so that the listener is not easily aware that the voice channel is being monitored.
  • FIG. 1 is a schematic structural diagram of a network for implementing lawful interception while establishing a switching of a user plane link in an MSC according to the present invention
  • FIG. 2 is a schematic structural diagram of a network that cannot implement lawful interception after a user plane link establishes a local exchange in a BSS according to the present invention
  • FIG. 3 is a signaling flowchart of an embodiment of a method for lawful interception according to the present invention.
  • FIG. 4 is a schematic diagram of a voice path of an embodiment of a method for lawful interception according to the present invention.
  • FIG. 5 is a signaling flowchart of another embodiment of a method for lawful interception according to the present invention.
  • FIG. 5 is another signaling flowchart of another embodiment of a method for lawful interception according to the present invention.
  • FIG. 6 is a signaling flowchart of still another embodiment of a method for lawful interception according to the present invention.
  • FIG. 7 is a signaling flowchart of still another embodiment of a method for lawful interception according to the present invention.
  • FIG. 8 is a schematic structural diagram of an MSC for lawful interception according to an embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of another embodiment of an MSC for lawful interception according to the present invention.
  • FIG. 10 is a schematic structural diagram of still another embodiment of an MSC for lawful interception according to the present invention.
  • FIG. 11 is a schematic structural diagram of another embodiment of an MSC for lawful interception according to the present invention;
  • FIG. 13 is a schematic structural diagram of an embodiment of a system for lawful interception according to the present invention; detailed description
  • FIG. 1 is a schematic diagram of a network structure for implementing lawful interception while establishing a switching of a user plane link in an MSC according to the present invention.
  • the user plane link that is, the voice channel between the two terminals MS1 and MS2 is connected to the MSC and looped back in the MSC. As long as the bypass is taken from the MSC to the monitoring system, one terminal or two terminals can be realized.
  • FIG. 2 is a schematic diagram of a network structure in which the user plane link cannot perform lawful interception after establishing a local exchange in the BSS according to the present invention. As shown in FIG.
  • the user plane link that is, the channel between the two terminals MS1 and MS2 is looped back in the BSS;
  • the BSS mainly includes the BSC and the BTS, and the loopback in the BSS may be two in the same BSC.
  • the voice channel between the terminals is looped back in the BSC, or the voice channel between the two terminals in the same BTS (cluster) is looped back in the BTS (cluster).
  • the scenario shown in Figure 2 is performed in the BSC. return.
  • the voice channel between the two terminals MS1 and MS2 does not need to be connected to the MSC, which saves the resources of the A interface between the BSS and the MSC, but cannot establish the legal interception from the MSC at this time.
  • the following embodiments of the present invention will specifically describe a technical solution for performing lawful interception of inter-terminal voice channels in a scenario in which two terminals perform local exchange in a BSS. It should be noted that the local exchange of inter-terminal voice channels established in the BSS mentioned in the embodiment of the present invention does not distinguish between local exchange within the BSC or local exchange within the BTS.
  • the technical solution adopted by the embodiment of the present invention is to establish local exchange of inter-terminal voice channels in the BSS.
  • the BSS is notified to the bypass to the MSC for performing lawful interception of the voice channel between the terminals; the local exchange of the inter-terminal voice channel may also be established in the base station subsystem BSS.
  • the local exchange is cancelled, and the voice channel between the MSC and the MSC is established for the terminal, and the voice channel is looped back through the MSC and the bypass is taken out from the MSC as a voice channel for legal interception.
  • the local exchange of the inter-terminal voice channel is established in the BSS
  • the local exchange is cancelled, and the voice channel between the MSC and the MSC is established for the terminal, and the voice channel is looped back through the MSC and bypassed from the MSC.
  • the scheme for the output of the lawful interception as the session path is specifically as follows:
  • the MSC notifies the BSS to cancel the local exchange of the voice channel between the two terminals, and establishes that the user plane link of the two terminals on the A interface is connected to the MSC, so that the words between the two terminals are
  • the road is connected to the MSC and looped back in the MSC, so that the bypass can be taken out from the MSC as a dialogue path for the lawful interception output for the lawful interception of the voice channel between the monitoring system and the terminal.
  • the MSC can perform the direct interception, that is, the MSC cancels the bypass of the output to the monitoring system without the assistance of the BSS.
  • FIG. 3 is a signaling flowchart of an embodiment of a method for lawful interception according to the present invention. This embodiment is implemented in the following scenario: Two terminals in the same session, i.e., the voice channel between the first terminal and the second terminal, have established a local exchange within the BSS. As shown in Figure 3, the following steps are included:
  • Step 301 The MSC sends a command to the BSS to perform a bypass operation on the established local switched voice channel corresponding to the corresponding terminal that the monitoring system requires to listen to;
  • FIG. 4 is a schematic diagram of a voice path according to an embodiment of a method for lawful interception according to the present invention.
  • the monitoring system may require listening to the voice path of one terminal MS1 to another terminal MS2, or requesting to listen to the voice channel of MS2 to MS1, or the voice path in both directions is required to be monitored.
  • the MSC sends a pair to establish a local. Exchanging the command of the bypass operation to the BSS of the two channels or two channels between the two terminals exchanged;
  • Step 302 The BSS bypasses the output of the local switched voice channel to the MSC, and returns a bypass operation response message to the MSC.
  • the BSS bypasses the outbound output of the voice channel between the two terminals to the MSC and returns to complete the bypass operation. Answering the message to the MSC, the MSC can obtain the voice of the call between the two terminals;
  • Step 303 The MSC receives the completion bypass operation response message returned by the BSS, and sends a bypass connection to the MSC to perform lawful interception of the conversation path by the monitoring system.
  • the lawful interception method provided in this embodiment can output the voice from the MSC for the lawful interception of the interception system by bypassing the voice channel between the two terminals to the MSC from the BSS, and the method does not cause the local system to be established.
  • the interruption of the voice on the channel between the two terminals exchanged or the time during which the voice is interrupted can be greatly shortened, so that the listener is not easily aware that his voice is being monitored.
  • the voice channel bypass is outputted to the MSC by the BSS bypass operation, and the voice is output to the monitoring system by the MSC for lawful interception, when the monitoring system no longer needs to continue to be legal.
  • the MSC can notify the BSS to terminate the bypass output of the terminal voice, and the BSS releases the voice channel of the two terminals to the bypass output of the MSC, that is, as shown in FIG. 3, to terminate the legal interception, after step 303, the method can further include:
  • Step 304 The MSC sends a release bypass operation command to the BSS.
  • Step 305 After receiving the release bypass operation command, the BSS releases the bypass connected to the MSC, and returns a bypass release completion message to the MSC.
  • the process of releasing the bypass to the MSC can be applied in the following embodiments in which the bypass is established to continue the call between the two terminals to the MSC to implement the termination of the lawful interception.
  • the message between the MSC and the BSS is transmitted on a call-related dedicated Signalling Connection Control Part (SCCP) link.
  • SCCP Call-related dedicated Signalling Connection Control Part
  • FIG. 5A is a signaling flowchart of another embodiment of a method for lawful interception according to the present invention. This embodiment is implemented in the following scenario: the call between two terminals in the same session is in the same BSS and the code is consistent or code compatible, and the voice channel between the two terminals can be established locally in the BSS. Exchange but not yet established. As shown in FIG. 5A, the following steps are included:
  • Step 501 The MSC sends a local exchange command to establish a session between the first terminal and the second terminal to the BSS.
  • the MSC determines that the calling party terminal and the called party terminal can Establishing a local exchange, and after receiving the connection request message sent by the called party terminal, sending a command to establish a local exchange between the two terminals to the BSS;
  • Step 502 After completing the establishment of the local exchange, the BSS returns a complete local exchange response message to the MSC.
  • Step 503 After receiving the completion of the local exchange response message returned by the BSS, the MSC sends a command to the BSS to perform a bypass operation on the established local switched channel corresponding to the corresponding terminal that the monitoring system requests to listen to;
  • the command for performing the bypass operation optionally carries the endpoint resource information prepared by the MSC for bypassing;
  • Step 504 The BSS bypasses the output of the local switched voice channel to the MSC, and returns a bypass operation response message to the MSC.
  • the completion bypass operation response message optionally carries the endpoint resource information allocated by the BSS as a bypass;
  • Step 505 The MSC receives the completion bypass operation response message returned by the BSS, and sends a bypass connection to the MSC to perform lawful interception of the conversation path by the monitoring system.
  • step 505 after receiving the completion bypass operation response message returned by the BSS, the MSC sends a connection request message sent by the called party to the MSC to the calling party terminal; after the calling party terminal receives the connection request message, Returning a connection response message to the MSC; the MSC sends a connection response message sent by the calling party terminal it receives to the called party terminal. So far, the establishment of the call of the two terminals is completed, and the bypass operation for monitoring the system dialogue path for lawful interception is completed.
  • FIG. 5B is another signaling flow diagram of another embodiment of a method for lawful interception according to the present invention. As shown in FIG. 5B, the following steps are specifically included:
  • Step 501 ′ the MSC sends a local exchange and a pair to establish a session between the first terminal and the second terminal.
  • the voice channel in the local exchange performs a bypass operation command to the BSS;
  • the command for performing the bypass operation optionally carries the endpoint resource information prepared by the MSC for bypassing;
  • the MSC determines that the calling party terminal and the called party terminal can establish a local exchange, and after receiving the connection request message sent by the called party terminal, send a local exchange between the two terminals to the BSS. And a command to perform a bypass operation on the voice channel in the local exchange;
  • Step 502 ′ the BSS completes the establishment of the local exchange and bypasses the output of the established local switched voice channel to the MSC, and returns a complete local exchange and bypass operation response message to the MSC;
  • the completion of the local exchange and bypass operation response message optionally carries the endpoint resource information allocated by the BSS for bypass;
  • Step 503 ′ the MSC receives the complete local exchange and bypass operation response message returned by the BSS, and the bypass is connected to the MSC to be used for the interception system to perform lawful interception of the conversation path.
  • step 503 ′ after receiving the completion local exchange and bypass operation response message returned by the BSS, the MSC sends a connection request message sent by the called party to the MSC to the calling party terminal; the calling party terminal receives the connection. After the request message, the connection response message is returned to the MSC; the MSC sends the connection response message sent by the calling party terminal to the called party terminal. So far, the establishment of the call of the two terminals is completed, and the bypass operation for monitoring the system dialogue path for lawful interception is completed.
  • the message for establishing the local switching and the bypass operation in the embodiment may be combined and sent in one message, or may be sent to the BSS separately, and the combination of sending the message in one message may save the time delay of the operation. Speed up the establishment of legal interception, making it easier for the listener to perceive the interruption of the session.
  • the solution specifically described in the foregoing embodiment establishing a local exchange between the first terminal and the second terminal in the BSS simultaneously or in the BSS
  • the BSS outputting the bypass to the MSC for performing the lawful interception of the session is specifically as follows:
  • the BSS output is notified to the MSC for legal interception of the conversation path.
  • the processing of the handover related message is first performed between the MSC and the BSS, and then the processing of the bypass operation related message is performed while the local exchange related message is processed.
  • the second mode in the process of the first terminal performing the handover, the MSC establishes the local exchange of the voice channel between the first terminal and the second terminal in the BSS, and notifies the BSS to output the bypass to the MSC for the execution of the session. monitor.
  • the third mode after the first terminal performs handover, the MSC establishes a local exchange between the first terminal and the second terminal in the BSS, and then the MSC notifies the BSS to output the bypass to the MSC for performing the dialogue. Lawful interception.
  • the processing of the handover related message is first performed between the MSC and the BSS, and then the local exchange related message is processed, and finally the bypass operation related message is processed, and the related messages of each processing are independent.
  • the fourth mode in the process of the first terminal performing handover, the MSC establishes a local exchange between the first terminal and the second terminal in the BSS, and then the MSC notifies the BSS to output the bypass to the MSC for performing the dialogue. Legal interception of the road.
  • the related messages of the handover and the local exchange are merged between the MSC and the BSS for processing, and then the processing of the bypass operation related message is performed.
  • FIG. 6 is a signaling flowchart of still another embodiment of a method for lawful interception according to the present invention.
  • This embodiment is implemented in the following scenario:
  • the first terminal performs inter-BSS handover, that is, the first terminal can establish a local exchange with the second terminal in the BSS after the first terminal switches from the other BSS to the BSS, that is, the first terminal at this time
  • Both the second terminal and the second terminal are within the BSS, and the conditions for local exchange within the BSS are met between the two.
  • the MSC in the second manner of the foregoing manner, in the process of performing handover in the first terminal, the MSC establishes local exchange of the voice channel between the first terminal and the second terminal in the BSS, and notifies BSS output bypass to
  • the method for performing lawful interception on the MSC includes the following steps:
  • Step 601 The other BSS sends a handover request message to the MSC, requesting the MSC to cut the first terminal from another BSS.
  • Step 602 The MSC selects, from the cell list of the handover request message, the target cell that the first terminal is to switch to, determines that the target cell belongs to the BSS, and determines that the voice channel between the first terminal and the second terminal meets the local exchange establishment condition, and Determining that the first terminal and the second terminal are to establish a local exchange and a bypass output, the MSC sends a handover request message to the BSS, where the handover request message carries a local exchange that establishes a session between the first terminal and the second terminal, and notifies the BSS to perform An indication of the bypass operation; the handover request message optionally further carrying the endpoint resource information prepared by the MSC for bypassing;
  • the MSC receives the handover request message, and receives the request for the interception system to perform lawful interception on one of the two voice channels or two voice channels between the first terminal and the second terminal, and may send the bearer to the BSS to establish the first a local exchange of voice channels between the terminal and the second terminal and a handover request message informing the BSS to perform an indication of the bypass operation;
  • Step 603 The BSS returns a handover request response message to the MSC, where the handover request response message carries a local exchange that establishes a session between the first terminal and the second terminal, and a response that notifies the BSS of the indication of the bypass operation;
  • the handover request response message optionally further carries the endpoint resource information prepared by the BSS for bypassing;
  • Step 604 The MSC sends a handover command to another BSS.
  • Step 605 When the BSS detects that the handover of the first terminal has been completed, the local exchange of the session between the first terminal and the second terminal is established, and the session between the first terminal and the second terminal is connected to the MSC through the bypass. Also completed;
  • Step 606 The BSS sends a handover complete message to the MSC, where the handover complete message carries the result of establishing the local exchange of the voice channel between the first terminal and the second terminal, and the result of the BSS performing the bypass operation.
  • the handover completion message optionally carries the endpoint resource information modified by the BSS as a bypass.
  • Step 607 The MSC sends a clear command for the first terminal to another BSS.
  • the MSC may finally determine that the call of the first terminal and the call of the second terminal do not establish a local call. Switching, and informing the BSS to directly connect the voice channel between the first terminal and the second terminal to the MSC, and the MSC performs loopback, so that the MSC leads the bypass to the monitoring system for lawful interception.
  • the method for lawful interception in this embodiment after the first terminal performs the inter-BSS handover, and after the other BSS switches to the BSS, after the first terminal and the second terminal in the BSS establish a session, the foregoing may be used.
  • the four ways to monitor the voice of the two terminals This method does not cause a voice interruption of the session of the two terminals establishing the local exchange or can greatly shorten the time of the interruption, so that the listener is not easily aware that his voice is being monitored.
  • the first terminal that has performed the session with the second terminal in the BSS and establishes the local exchange is switched from the BSS to another BSS, and the second terminal residing in the BSS does not satisfy the local exchange establishment condition, It can include the following steps:
  • Step 601 ′ when performing handover of the first terminal from the BSS to another BSS, the MSC notifies the BSS to cancel the local exchange;
  • Step 602 ′ the BSS cancels the local exchange while canceling the bypass established by the first terminal and the second terminal for connecting the voice channel to the MSC, and directly connecting the voice channel of the second terminal in the BSS to the MSC;
  • Step 603' the session of the first terminal to which the other BSS switches is also reconnected to the MSC. Specifically, after receiving the handover request message sent by the BSS, the MSC determines that the first terminal that is switched from the BSS and the second terminal that is still resident in the BSS cannot continue to maintain the local exchange, that is, the users of the first terminal and the second terminal. After the switchover is performed on the MSC, the MSC initiates the above-mentioned operation of releasing the local exchange between the first terminal and the second terminal.
  • the voice channel to which the local exchange is established in the BSS is released, and the voice channel to the MSC is re-established in another BSS; for the second terminal still in the BSS, only the bypass needs to be canceled, and the locally switched voice channel is directly connected to the MSC. Just fine.
  • the two terminals can be re-established to the MSC, so that the voice channels of the two terminals can be looped back in the MSC, so that if the monitoring system needs to perform lawful interception on the terminal, it can be directly extracted by the MSC. Voice for legal listening.
  • FIG. 7 is a signaling flowchart of still another embodiment of a method for lawful interception according to the present invention.
  • the embodiment is implemented in the following scenario: the first terminal performs handover in the BSS where the second terminal is located, and can establish local exchange with the second terminal in the same BSS, and the handover in the BSS may be the first terminal.
  • the switching from one BTS to another BTS in the same BSS is not differentiated in the embodiment of the present invention and is collectively referred to as intra-BSS handover.
  • the first terminal performs the handover, and the MSC establishes the local exchange of the voice between the first terminal and the second terminal in the BSS, and notifies the same.
  • the BSS output is bypassed to the MSC for performing lawful interception of the session path.
  • the lawful interception method specifically includes the following steps:
  • Step 701 The MSC sends an inquiry to the BSS to perform internal handover on the first terminal.
  • This step 701 is an optional step.
  • Step 702 The BSS sends an internal handover request message to the MSC.
  • Step 703 After receiving the internal handover request message sent by the BSS, the MSC sends an internal handover command to the BSS. If the MSC determines that the two terminals meet the local exchange establishment condition of the session after the handover, the internal handover command carries the first terminal and Local exchange of voice channels between the second terminals and an indication to notify the BSS to perform a bypass operation;
  • the internal handover command optionally carries the endpoint resource information prepared by the MSC for bypassing.
  • Step 704 The BSS completes establishment of the local exchange of the session between the first terminal and the second terminal, and the first terminal and the second terminal are configured.
  • the inter-office channel is connected to the MSC by the bypass, and returns a handover completion response message to the MSC.
  • the handover completion response message carries the establishment result of the local exchange between the first terminal and the second terminal and the result of the bypass operation performed by the BSS;
  • the handover completion response message optionally carries the endpoint resource information allocated by the BSS for the bypass.
  • the MSC may finally determine that the call of the first terminal and the call of the second terminal do not establish a local call.
  • the exchange that is, the internal handover command sent by the MSC to the BSS does not carry the local exchange that establishes the session between the first terminal and the second terminal, and notifies the BSS of the bypass operation, and still performs the ring on the MSC after the handover. Back, so that the MSC leads the bypass for monitoring.
  • the first terminal performs intra-BSS handover, and after the first terminal and the second terminal establish a voice channel, the voice channels of the two terminals can be monitored by using the above four methods.
  • This method does not cause a voice interruption of the session of the two terminals establishing the local exchange or can shorten the time of the interruption, so that the listener is not easily aware that his voice is being monitored.
  • Step 701 ′ When performing handover of the first terminal in the BSS, the MSC notifies the BSS to cancel the local exchange in the internal handover command;
  • Step 702 ′ the BSS cancels the local exchange while canceling the bypass established between the first terminal and the second terminal for connecting the voice channel to the MSC, and connecting the voice channel of the second terminal in the BSS to the MSC;
  • Step 703' the BSS connects the voice channel of the first terminal that performs the BSS handover to the MSC. Specifically, after receiving the internal handover request message sent by the BSS, the MSC determines that the local exchange between the first terminal and the second terminal in the BSS cannot be maintained, that is, the user plane link between the first terminal and the second terminal must be switched after the handover. The loopback is performed on the MSC, and the MSC initiates the above-mentioned operation of releasing the local exchange between the first terminal and the second terminal.
  • the two terminals can be re-established to the MSC, so that the voice channels of the two terminals are looped back in the MSC, so that if the monitoring system needs to legalize the terminal Listening, you can directly voice the voice from the MSC for lawful interception.
  • FIG. 8 is a schematic structural diagram of an MSC for lawful interception according to an embodiment of the present invention.
  • the MSC 8 is configured to establish a local exchange of the voice channel between the first terminal and the second terminal in the BSS 9, or to establish a local exchange between the voice channel between the first terminal and the second terminal in the BSS 9, and notify the The BSS9 output is bypassed to the MSC 8 for lawful interception of the session.
  • the MSC 8 may specifically include: a first sending module 81, a first receiving module 82, and a processing module 83.
  • the first sending module 81 is configured to send, to the BSS9, a local exchange command for establishing a session between the first terminal and the second terminal, and/or a command for performing a bypass operation on the session in the local exchange;
  • the first receiving module 82 is configured to: Receiving the establishment of the local exchange by the BSS 9 and/or bypassing the corresponding completed local exchange response message and/or completing the bypass operation response message returned after the local exchanged voice channel output is returned to the MSC 8;
  • the processing module 83 is configured to receive the After completing the local exchange and bypass operation response message or completing the bypass operation response message returned by the BSS, the bypass connection to the MSC is taken out for legal interception of the execution of the conversation path.
  • the MSC 8 may further include: a second sending module 84 and a second receiving module 85.
  • the second sending module 84 is configured to send a release bypass operation command to the BSS9;
  • the second receiving module 85 is configured to receive a bypass release complete message returned by the BSS9 after the bypass connected to the MSC8 is released according to the release bypass operation command. .
  • the messages sent and received by the first sending module and the first receiving module in the MSC provided in this embodiment may be sent in different messages in a time series relationship, or may be combined and sent in the same message simultaneously.
  • the messages sent and received by the first sending module and the first receiving module in the MSC provided in this embodiment may be sent in different messages in a time series relationship, or may be combined and sent in the same message simultaneously.
  • the MSC provided in this embodiment connects the voice channel between the two terminals to the MSC from the BSS through a bypass operation, so that the bypass can be bypassed from the MSC for lawful interception by the monitoring system, and the method does not cause the local device to be established.
  • the interruption of the voice on the channel between the two terminals exchanged or the time during which the voice is interrupted can be greatly shortened, so that the listener is not easily aware that his voice is being monitored.
  • FIG. 9 is a schematic structural diagram of another embodiment of an MSC for lawful interception according to the present invention. As shown in FIG. 9, if the first terminal switches from another BSS 91 to the BSS 92, it can be built with the second terminal in the BSS 92.
  • the MSC 8 may specifically include: a third receiving module 81', a selection determining module 82', and a third sending module 83'.
  • the third receiving module 8 is configured to receive a handover request message sent by another BSS 91, requesting the MSC 8 to switch the first terminal away from the other BSS 91, and receive a handover request response message returned by the BSS 92, where the handover request response message carries the first establishment a local exchange of the session between the terminal and the second terminal and a response notifying the BSS 92 of the indication of the bypass operation; receiving the handover completion message returned by the BSS 92 to complete the handover of the first terminal, the establishment of the local exchange, and the bypass operation, The handover completion message carries the result of the local exchange establishment and the result of the bypass operation.
  • the selection determination module 82 ' is configured to select the target cell to be switched by the first terminal from the cell list of the handover requirement message, and determine that the target cell belongs to the BSS92. And determining that the voice channel between the first terminal and the second terminal meets the local exchange establishment condition, and determining whether the first terminal and the second terminal need to establish a local exchange and a bypass output; the third sending module 83' is configured to the BSS92. Sending a handover request message, where the handover request message carries the first terminal and the second terminal And notifying the BS S92 local switching instruction bypass operations; send a handover command to the other BSS91.
  • the MSC provided in this embodiment describes a technical solution for implementing lawful interception of a monitoring system to a terminal when a first terminal establishes a local exchange with a second terminal in the BSS after switching from another BSS to the BSS, switching, local switching, and
  • the operation of the bypass may be performed in a time-series relationship in different messages, or may be sent in the same message at the same time.
  • the specific scheme description is described in the foregoing method for lawful interception. Let me repeat.
  • the MSC provided in this embodiment connects the voice channel between the two terminals to the MSC from the BSS through a bypass operation, so that the bypass can be bypassed from the MSC for lawful interception by the monitoring system, and the method does not cause the local device to be established.
  • the interruption of the voice on the channel between the two terminals exchanged or the time during which the voice is interrupted can be greatly shortened, so that the listener is not easily aware that his voice is being monitored.
  • FIG. 10 is a schematic structural diagram of still another embodiment of an MSC for lawful interception according to the present invention.
  • the MSC 8 may specifically include: a fourth receiving module 81" and a fourth sending Module 82".
  • the fourth receiving module 81 is configured to receive an internal handover request sent by the BSS 93.
  • the receiving BSS93 completes the handover of the first terminal, the establishment of the local exchange, and the handover completion response message returned after the bypass operation, where the handover completion response message carries the result of the local exchange establishment and the result of the bypass operation;
  • the module 82" is configured to send an internal handover command to the BSS 93 after receiving the internal handover request message received by the fourth receiving module 81.
  • the internal handover command carries a local exchange for establishing a session between the first terminal and the second terminal. And an instruction to notify the BSS 93 to perform a bypass operation.
  • the MSC provided in this embodiment describes a technical solution for implementing lawful interception of the interception system to the terminal when the first terminal can perform local exchange with the second terminal in the same BSS 93 after the handover in the BSS 93, switching, local switching, and bypassing.
  • the operation may be performed in a time-series relationship in different messages, or may be sent in the same message at the same time.
  • the MSC provided in this embodiment connects the voice channel between the two terminals to the MSC from the BSS through a bypass operation, so that the bypass can be bypassed from the MSC for lawful interception by the monitoring system, and the method does not cause the local device to be established.
  • the interruption of the voice on the channel between the two terminals exchanged or the time during which the voice is interrupted can be greatly shortened, so that the listener is not easily aware that his voice is being monitored.
  • FIG. 11 is a schematic structural diagram of still another embodiment of an MSC for lawful interception according to the present invention. If the first terminal that has been in session with the second terminal and the local exchange is established in the BSS 92' is switched from the BSS 92' to the other BSS 91', the second terminal residing in the BSS 92' does not satisfy the local exchange establishment condition.
  • the MSC 8 may further include: a first notification module 86 and a first session connection, in addition to the first sending module 81, the first receiving module 82, and the processing module 83 included in FIG. Module 87.
  • the first notification module 86 is configured to notify the BSS 92' to cancel the local exchange; the first session connection module 87 is configured to connect the disconnected first terminal and the second terminal to the MSC8, so as to connect the first terminal.
  • the channel between the second terminal and the second terminal is extracted for performing lawful interception of the conversation path.
  • the first notification module and the first session connection module can re-establish the channel of the two terminals to the MSC, so that the voice channels of the two terminals can be looped back in the MSC, so that if the monitoring system needs to perform lawful interception on the terminal,
  • the voice is derived by the MSC for lawful interception.
  • FIG. 12 is a schematic structural diagram of still another embodiment of an MSC for lawful interception according to the present invention.
  • the MSC 8 may further include: a second notification module 86' and a second session connection module 87' in addition to the first sending module 81, the first receiving module 82, and the processing module 83 included in FIG.
  • the second notification module 86' is configured to notify the BSS 93' to cancel the local exchange;
  • the second session connection module 87' is configured to connect the disconnected first terminal and the second terminal to the MSC8, so that the first The voice path between a terminal and the second terminal is extracted for performing lawful interception of the conversation path.
  • the second notification module and the second session connection module can re-establish the channel of the two terminals to the MSC, so that the voice channels of the two terminals can be looped back in the MSC, so that if the monitoring system needs to perform lawful interception on the terminal, The voice is derived by the MSC for lawful interception.
  • FIG. 13 is a schematic structural diagram of an embodiment of a system for lawful interception according to the present invention.
  • the system includes a mobile switching center MSC1, a base station subsystem BSS2, and a listening system 3.
  • the MSC1 is configured to notify the BSS2 output bypassing after establishing a local exchange of the voice channel between the first terminal and the second terminal in the BSS2 or after establishing a local exchange between the first terminal and the second terminal in the BSS2.
  • MSC1 MSC1
  • BSS2 is used for bypass operation, and the output is bypassed to MSC1 to extend the connection established between the terminals to MSC1
  • MSC1 is also used to extract voice from the connection to MSC1 to the interception system 3
  • 3 is used to perform lawful interception of the conversation path by voices elicited from MSC1.
  • the lawful interception system provided in this embodiment bypasses the call between the two terminals from the BSS to the MSC through the bypass operation, so that the bypass can be taken out from the MSC for the interception system to perform lawful interception, and the method does not cause
  • the establishment of a local exchange of voice interruptions between the two terminals or the interruption of the voice can be greatly shortened, so that the listener is not easily aware that his voice is being monitored.
  • the technical solution of the lawful interception method and system provided by the embodiments of the present invention can be applied to a communication system such as a Global System for Mobile Communications (GSM), a Code Division Multiple Access (CDMA) system, or a Wideband Code Division Multiple Access (WCDMA) system.
  • GSM Global System for Mobile Communications
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
PCT/CN2009/071166 2009-04-03 2009-04-03 合法监听的方法、系统及移动交换中心 WO2010111843A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP09842500A EP2426967A4 (de) 2009-04-03 2009-04-03 Verfahren, system und mobilvermittlungsstelle für legales abhören
CN200980117319.XA CN102405662B (zh) 2009-04-03 2009-04-03 合法监听的方法、系统及移动交换中心
PCT/CN2009/071166 WO2010111843A1 (zh) 2009-04-03 2009-04-03 合法监听的方法、系统及移动交换中心

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2009/071166 WO2010111843A1 (zh) 2009-04-03 2009-04-03 合法监听的方法、系统及移动交换中心

Publications (1)

Publication Number Publication Date
WO2010111843A1 true WO2010111843A1 (zh) 2010-10-07

Family

ID=42827475

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/071166 WO2010111843A1 (zh) 2009-04-03 2009-04-03 合法监听的方法、系统及移动交换中心

Country Status (3)

Country Link
EP (1) EP2426967A4 (de)
CN (1) CN102405662B (de)
WO (1) WO2010111843A1 (de)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104080132B (zh) * 2013-03-25 2018-06-19 中国移动通信集团公司 一种数据处理方法和设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1674706A (zh) * 2004-03-24 2005-09-28 华为技术有限公司 一种实现快速组呼呼叫的方法
CN1802001A (zh) * 2004-12-31 2006-07-12 华为技术有限公司 一种移动通信系统中组呼信道资源的管理方法
CN101350742A (zh) * 2007-07-20 2009-01-21 中兴通讯股份有限公司 一种实现下一代网络语音监听的方法和系统

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1691675B (zh) * 2004-04-20 2012-03-21 华为技术有限公司 一种自动上报目标用户设备位置信息的方法
CN100384297C (zh) * 2005-01-07 2008-04-23 华为技术有限公司 一种移动网接网方法
ES2286768T3 (es) * 2005-03-07 2007-12-01 Alcatel Lucent Interceptacion legal en redes.
EP1883195A1 (de) * 2006-07-28 2008-01-30 Nokia Siemens Networks Gmbh & Co. Kg Tunnelumschaltmechanismus innerhalb eines SGSN für OTA (1-Tunnelansatz) - TTA (2-Tunnelansatz) Umschaltung genutzt zur legalen Erfassung
CN101141816B (zh) * 2007-10-08 2010-06-02 中兴通讯股份有限公司 一种主控msc获取服务msc下移动终端位置的方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1674706A (zh) * 2004-03-24 2005-09-28 华为技术有限公司 一种实现快速组呼呼叫的方法
CN1802001A (zh) * 2004-12-31 2006-07-12 华为技术有限公司 一种移动通信系统中组呼信道资源的管理方法
CN101350742A (zh) * 2007-07-20 2009-01-21 中兴通讯股份有限公司 一种实现下一代网络语音监听的方法和系统

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2426967A4 *

Also Published As

Publication number Publication date
CN102405662A (zh) 2012-04-04
EP2426967A1 (de) 2012-03-07
CN102405662B (zh) 2014-06-11
EP2426967A4 (de) 2012-03-07

Similar Documents

Publication Publication Date Title
JP4708473B2 (ja) 通信システム、移動機、着信制御方法
CN101448287B (zh) 一种激活状态下用户设备跨接入网切换的实现方法
JP2004502378A (ja) 通信システムにおける無線アクセス・ベアラーの再構成方法
JP2003530767A (ja) インターネット・プロトコル移動通信ネットワークの技術分野で呼設定を行うための手法
JP4701289B2 (ja) 非同期移動通信網から同期移動通信網へのハンドオーバー方法
JP5547337B2 (ja) 回線交換フォールバック(csfb)を中止する方法、移動管理装置、ビジターロケーションレジスタ及びcsfb通信システム
JP2011505718A (ja) 移動無線ネットワークにおいて回路交換コールを確立する方法及び移動無線ネットワーク
WO2009065321A1 (fr) Procédé, système et dispositif pour traiter le service d'un domaine à commutation de circuits
EP2156687B1 (de) Anrufabwicklung in einem mobilkommunikationsnetz
WO2009067912A1 (fr) Procédé et dispositif de commutation pour mettre en œuvre une commutation
KR101012004B1 (ko) 이동통신 시스템에서 핵심망과 제어국 사이의 자원 절약을 위한 장치 및 방법
CN102497396B (zh) 通信方法、基站、基站控制器和移动交换中心
WO2011017894A1 (zh) 一种本地呼叫本地交换的实现方法和系统
WO2011113207A1 (zh) 用于业务交换的方法以及设备
WO2011057578A1 (zh) 一种本地呼叫本地交换的实现方法
JP5254242B2 (ja) トランキングシステムにおける呼出方法及びその装置
KR100641326B1 (ko) 차세대 이동통신망에서의 호처리 방법
WO2010111843A1 (zh) 合法监听的方法、系统及移动交换中心
WO2008148313A1 (fr) Procédé de transfert, station mobile et dispositif de commutation
CN102244928A (zh) 一种语音呼叫被呼、起呼建立方法、装置及系统
WO2010091612A1 (zh) 建立本地交换的方法、核心网设备及基站子系统
CN101860926B (zh) 一种切入过程中呼叫建立方法和系统
CN100442938C (zh) 寻呼双模终端的方法
KR100976935B1 (ko) 비동기망과 동기망이 혼재된 이동통신망에서의 핸드오버방법
KR20090124283A (ko) 통신시스템에서 호 충돌을 방지하는 방법 및 장치

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200980117319.X

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09842500

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 4287/KOLNP/2011

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2009842500

Country of ref document: EP

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: PI0925038

Country of ref document: BR

ENP Entry into the national phase

Ref document number: PI0925038

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20111003